Skip to main content

Conklin-Art

Dr. Arthur Conklin, Associate Professor

Department of Information and Logistics Technology, College of Technology

FACULTY WEBSITE


  • Areas of expertise

    • Information security in industrial control systems
    • Systems engineering perspectives of computer security
    • Secure software engineering
    • Information assurance curriculum and instruction
  • Awards

    • UH Service Excellence Award, May 12, 2016
  • Publications

    • Conklin, Wm. Arthur; “Control Systems Personnel are from Mars; IT Personnel are from Venus”, International Journal of Critical Infrastructure Protection, Fall 2011, DOI 10.1016/j.ijcip.2011.06.004
    • Conklin, Wm. Arthur, McLeod, Alexander; “Information Security Foundations for the Interoperability of Electronic Health Records”, International Journal of Healthcare Technology and Management, Volume 11, Number 1-2 / 2010, Pages 104 – 112.
    • Nancy R. Mead, et. al; “Making the Business Case for Software Assurance” Special Report, CERT Program, April 2009, CMU/SEI-2009-SR-001, http://www.sei.cmu.edu
    • Conklin, Wm. Arthur; McLeod, Alexander, “Introducing the Information Technology Security Essential Body of Knowledge Framework”, Journal of Information Privacy and Security, Vol 5, Issue 2, 2009 Pages 27 - 41.
    • Conklin, Wm. Arthur, “Information Security and Small Business”, Visual Communications Journal, Fall 2008.
    • Shoemaker, Dan; Conklin, Art, “Finding a Vendor You Can Trust in the Global Marketplace”, Build Security In, US Department of Homeland Security, National Cyber Security Division; Retrieved 2008-08-14, from https://buildsecurityin.us-cert.gov/daisy/bsi/articles/bestpractices/acquisition/1058-BSI.html
    • White, G., Conklin, A., “The appropriate use of force-on-force cyberexercises”, Security & Privacy Magazine, IEEE, Volume: 2, Issue: 4, July-Aug. 2004 Pages: 33 – 37
  • Patents

     

    Not available

  • Funded Research

    • Conklin, Wm. Arthur (PI), UH sub on BAHEP Wagner-Peyser Grant, $85,000, Feb 2014
    • Conklin, Wm. Arthur (PI), University of Houston Faculty Development Improvement Program grant, TEPM Writing Center Project, $24,932, May 2011.
    • Conklin, Wm. Arthur (PI), University of Houston Research Grant, SCADA Laboratory Setup, $350,000, September 2010
    • Cline, Ray (PI), Conklin, Wm. Arthur (SP), Department of Energy, Smart Grid Energy Training Coalition, response to DE-FOA-0000152, $2.5million over 3 years, July 2010.
    • Conklin, Wm. Arthur (PI), Department of Energy, National Energy Sector Cyber Security Office Research (NESCOR), $237,000 over 3 years, August 2010.
    • Conklin, Wm. Arthur, Heidar Malki (PI for CoT), Texas Workforce Commission, Meeting Industries’ Critical Workforce Needs Bay Area Houston Economic Partnership – Aerospace Project (build Information Assurance Curriculum) (w/ M. Gibson), $100,824 out of $252K CoT total award, (co-PI for IA curriculum dev piece), April 2007- March 2009
  • Curriculum Vitae

     

    Wm. Arthur Conklin, Ph.D.

    waconklin@uh.edu

    1. Academic Training

     Ph.D. Business Administration - Information Systems, 2006

    The University of Texas at San Antonio

    Dissertation: “Computer Security Behaviors of Home PC Users: A Diffusion of Innovation

    Approach”

     Electrical Engineer (Space Systems Engineering), 1991

    Naval Postgraduate School, Monterey CA

     Master of Business Administration (Information Systems), 1999

    The University of Texas at San Antonio

     Master of Science Electrical Engineering (Space Systems Engineering), 1991

    Naval Postgraduate School, Monterey CA

     Bachelor of Arts (Biology), 1982

    Washington University in St. Louis

    1. Summary of Work Experience

     2012-Present, Associate Professor, University of Houston, College of Technology,

    Department of Information, Logistics Technology

     2010-Present, Director, Center for Information Security Research and Education, University

    of Houston, College of Technology

     1998-Present, Principal, Wass House, Inc., Houston, TX

     2006-2012, Assistant Professor, University of Houston, College of Technology,

    Department of Information, Logistics Technology

     2005-2006, Technical Director, Center for Infrastructure Assurance and Security, The

    University of Texas at San Antonio

     2004-2006, Research Assistant Professor, Center for Infrastructure Assurance and

    Security, The University of Texas at San Antonio

     2002-2004, Research Scientist III, Center for Infrastructure Assurance and Security, The

    University of Texas at San Antonio

     1998-2004, Senior Lecturer, Adjunct Faculty, The University of Texas at San Antonio,

    College of Business, Information Systems Department

     1999-2002, Senior Systems Analyst: USAA, San Antonio, TX

     1997-1999, Quality Systems Manager: Harris Corporation, San Antonio, TX

     1994-1997, Plant Manager: Standard Industries, San Antonio, TX

     1992-1994, Director of Quality, Evans Container, Harvey, LA

     1991-1992, Sales Representative, Nalco Chemical Company, Tulsa, OK

     1982-1991, Surface Warfare Officer, US Navy, Engineering Duty Officer

    Conklin CV, 1/6/2015

    2

    1. Classes Taught

    University of Houston

    CIS 2337 Introduction to Organizational Security*

    CIS 3337 Secure Application Design*

    CIS 3351 Intrusion Detection and Incident Response*

    CIS 6321 Introduction to Information Systems Security*

    CIS 6322 Secure Enterprise Computing*

    CIS 6323 Applied Cryptography and Information Systems Security*

    CIS 6324 Information Systems Security Risk Assessment*

    CIS 6337 Digital Forensics*

    CIS 6347 Adv. Digital Forensics*

    CIS 6357 Control Systems Security*

    CIS 6358 Secure Software Design*

    CIS 6359 Penetration Testing*

    CIS 6397 Strategic Information Security*

    University of Texas at San Antonio

    IS 3063 Database Management for Information Systems

    IS 3413/IS 4123 Introduction to Telecommunication for Business

    IS 4063 Advanced Topics in Information Systems

    IS 4143 Wide Area Networks

    IS 4163 Advanced Programming Concepts*

    IS 4463 Secure Electronic Commerce*

    IS 4953 SS-IS: Software Development*

    IS 4953 SS-IS: Secure Software Design*

    IS 5143 Information Technology*

    IS 5193 Software Engineering Management*

    IS 5203 Telecommunication Systems*

    IS 6103 Information Systems Design and Implementation*

    IS 6203 Data Communication and Network Management

    IS 6423 Secure Software Design*

    IS 6503 Principles of Database Management

    IS 6603 Computer Security and Control*

    IS 6703 Advanced Business Information Systems*

    IS 6973 Software Engineering*

    IS 6973 Special Topics in IS

    *denotes class where I was lead instructor/designed class.

    UH is an NSA/DHS certified Center of Academic Excellence in Information Assurance

    Education (CAEIAE) with courseware certified to CNSSI Standards 4011, 4014E, 4016E

    UTSA is an NSA/DHS certified Center of Academic Excellence in Information Assurance

    Education (CAEIAE)

    1. Research Interests

    Information Security in Industrial Control Systems (SCADA)

    Systems Engineering Perspectives of Computer Security

     Authentication Systems

     Information Asymmetry and Security

    Secure Software Engineering

    Information Assurance Curriculum and Instruction

    Conklin CV, 1/6/2015

    3

    1. Refereed Publications

    Conklin, Wm. Arthur; “Control Systems Personnel are from Mars; IT Personnel are from Venus”,

    International Journal of Critical Infrastructure Protection, Fall 2011, DOI

    10.1016/j.ijcip.2011.06.004

    Conklin, Wm. Arthur, McLeod, Alexander; “Information Security Foundations for the

    Interoperability of Electronic Health Records”, International Journal of Healthcare Technology

    and Management, Volume 11, Number 1-2 / 2010, Pages 104 – 112.

    Nancy R. Mead, et. al; “Making the Business Case for Software Assurance” Special Report,

    CERT Program, April 2009, CMU/SEI-2009-SR-001, http://www.sei.cmu.edu

    Conklin, Wm. Arthur; McLeod, Alexander, “Introducing the Information Technology Security

    Essential Body of Knowledge Framework”, Journal of Information Privacy and Security, Vol 5,

    Issue 2, 2009 Pages 27 - 41.

    Conklin, Wm. Arthur, “Information Security and Small Business”, Visual Communications

    Journal, Fall 2008.

    Shoemaker, Dan; Conklin, Art, “Finding a Vendor You Can Trust in the Global Marketplace”,

    Build Security In, US Department of Homeland Security, National Cyber Security Division;

    Retrieved 2008-08-14, from https://buildsecurityin.us-cert.gov/daisy/bsi/articles/bestpractices/acquisition/1058-BSI.html

     

    White, G., Conklin, A., “The appropriate use of force-on-force cyberexercises”,

    Security & Privacy Magazine, IEEE, Volume: 2, Issue: 4, July-Aug. 2004 Pages: 33 – 37

    1. Book Chapters and Other Publications (* - blind reviewed)

    Security+ Certification All-in-One Exam Guide, Wm. Arthur Conklin, Gregory B. White, Chuck

    Cothren and Dwayne Williams, Fourth Edition, McGraw Hill, 2014, 600 pages, Lead Author.

    Computer Security Lab Manual, Vincent Nestler, Keith Harrison, Matthew Hirsch, Wm. Arthur

    Conklin, Fourth Edition, McGraw Hill Technology Education, 2014, 360 pages.

    CSSLP Certification All-in-One Exam Guide, Wm. Arthur Conklin, Dan Shoemaker, First Edition,

    McGraw Hill Technology Education, December 2013, 650 pages, Lead Author

    CASP CompTIA Advanced Security Practitioner Certification Study Guide (Exam CAS-001),

    Wm. Arthur Conklin, First Edition, McGraw Hill Technology Education, December 2011, 710

    pages, Lead Author

    Principles of Computer Security: Security+ and Beyond, Wm. Arthur Conklin, Gregory B. White,

    Chuck Cothren and Dwayne Williams, Third Edition, McGraw Hill Technology Education,

    November 2011, 730 pages, Lead Author

    Security+ Certification All-in-One Exam Guide, Wm. Arthur Conklin, Gregory B. White, Chuck

    Cothren and Dwayne Williams, Third Edition, McGraw Hill, October 2011, 600 pages, Lead

    Author.

    Conklin CV, 1/6/2015

    4

    Cybersecurity: The Essential Body of Knowledge, Dan Shoemaker, Wm. Arthur Conklin, First

    Edition, Delmar Cengage Learning, June 2011, 512 pages.

     

    Computer Security Lab Manual, Vincent Nestler, Wm. Arthur Conklin, Greg White, Second

    Edition, McGraw Hill Technology Education, 2010, 400 pages, lead author of on-line resources.

    Principles of Computer Security: Security+ and Beyond, Second Edition, McGraw Hill

    Technology Education, December 2009, 730 pages, Lead Author

    Security+ Certification All-in-One Exam Guide, Second Edition, McGraw Hill, 2008, 592 pages,

    Lead Author.

    *Threat Modeling and Secure Software Engineering Process. Chapter XXXVI, In Jatinder N. D.

    Gupta & S. K. Sharma (Eds.), Handbook of Research on Information Security and Assurance:

    Information Science Reference, August 2008

    Security+ Certification All-in-One Exam Guide, First Edition, Osbourne-McGraw Hill, 2003, 592

    pages.

    Principles of Computer Security: Security+ and Beyond, McGraw Hill Technology Education,

    2004, 800 pages, Lead Author

    Computer Security Lab Manual, McGraw Hill Technology Education, 2005, 400 pages, lead

    author of on-line resources.

    1. Conference Proceedings (* - blind reviewed)

    *Conklin, Wm. Arthur; State-based Network Isolation for Critical Infrastructure Systems Security,

    Proceedings of the 48th Annual Hawaii International Conference on System Sciences, January

    2015.

    *Conklin, Wm Arthur; Developing Employable Information Security Workforce Knowledge Skills

    and Abilities, Proceedings of the ATMAE 2014 Conference, St. Louis, MO, November 2014.

    *Conklin, Wm. Arthur; Cline, Raymond; Roosa, Tiffany; Re-engineering Cybersecurity Education

    in the US: An Analysis of the Critical Factors, Proceedings of the 47th Annual Hawaii

    International Conference on System Sciences, January 2014.

    *Roosa, Tiffany; Conklin, William Arthur; Cassler, Dan; The Changing Face of Technology

    Education: Shovel Ready Education, Proceedings of the ATMAE 2013 Conference, New

    Orleans, LA, November 20-23, 2013.

    Conklin, Wm Arthur; Network Architecture: Important Role in Securing Control Systems,

    Industrial Control Systems Joint Working Group (ICSJWG), Gaithersburg, MD, November 11-

    13, 2013

    *Conklin, Wm. Arthur; Dietrich, Glenn, What the Graduate Needs to Know about Operational

    Information Security, Proceedings of the Eighteenth Americas Conference on Information

    Systems, Seattle, WA, August 9-12, 2012.

    Conklin, Wm. Arthur; A New Paradigm for Industrial Control Systems Operational Security,

    Industrial Control Systems Joint Working Group (ICSJWG), Savannah, GA, May 7-9, 2012

    Conklin CV, 1/6/2015

    5

    *Conklin, Wm. Arthur; Pollet, Jonathan; Cumings, Joe; Design of a SCADA Laboratory to

    Support IT Classes, Proceedings of the 15th Annual Colloquium for Information Systems

    Security Education, Fairborn, OH, June 13-15, 2011,.

    *Conklin, Wm. Arthur; Conklin, Susan; Haque, Ikram; Towards Designing Electronic Health

    Record Systems: Value of the Long Tail, Proceedings of the Southwest Region Decision

    Sciences Institute Conference, Houston, TX, March 2011.

    *Conklin, Wm. Arthur; Software Assurance: The Need for Definitions, Proceedings of the 44th

    Annual Hawaii International Conference on System Sciences, January 2011.

    *Young, D. K., Conklin, W. A., Dietrich, G.; Re-examining the Information Systems Security

    Problem from a Systems Theory Perspective, Proceedings of the Sixteenth Americas

    Conference on Information Systems, Lima, Peru, August 12-15, 2010.

    *Conklin, Wm. Arthur, Emergency Communications Using the Web: Matching Media Richness

    to the Situation, Proceedings of the 43th Annual Hawaii International Conference on System

    Sciences, January 2010.

    *Conklin, Wm. Arthur; Information Security Foundations for Electronic Medical Records,

    Proceedings of the Fifteenth Americas Conference on Information Systems, San Francisco, CA,

    6-9 August 2009.

    *Conklin, Wm. Arthur, “Security in Cyber-Physical Systems”, Workshop on Future Directions in

    Cyber-physical Systems Security, Newark, NJ, July 22-24, 2009

    Conklin, Wm. Arthur, McLeod, Alexander; “Examining the Information Technology Security

    Essential Body of Knowledge”, Proceedings of the 8th Annual Security Conference, Las Vegas,

    April 2009.

    *Rich, Eliot, Conklin, Wm. Arthur; “Using Systems Models to Improve Information Security

    Management”, System Dynamics Winter Conference, Texas A&M University, College Station,

    Texas, January 9-10, 2009.

    *Conklin, Wm. Arthur; “Information Sharing and Emergency Services: An Examination using

    Information Security Principles”, 2008 Americas Conference on Information Systems, 14-17

    August 2008, Toronto, ON.

    *Conklin, Wm. Arthur; Dietrich, Glenn, “Systems Theory Model for Information Security”,

    Proceedings of the 41th Annual Hawaii International Conference on System Sciences, January

    2008.

    *Conklin, Wm. Arthur, “Why FISMA Falls Short: The need for security metrics”, Proceedings of

    the Second Annual Workshop on Information Security and Privacy – WISP 2007, (SIGSEC preICIS),

    Montreal, Canada, December 2007.

    *Conklin, Wm. Arthur, “The Design Of an Information Security Practicum Course”, Proceedings

    of the 2007 International Academy for Information Management - (SIGED pre-ICIS), Montreal,

    Canada, December 2007.

    Conklin CV, 1/6/2015

    6

    *Conklin, Wm. Arthur; Jensen, Bradley; “Entity Data Model as a Mistake Proofing Mechanism”,

    Academic Days Conference on Business Applications, Relational Databases, and Security,

    November 2007.

    Conklin, Wm. Arthur, “Why FISMA Doesn’t Work”, GFirst Conference, Orlando, FL, June 2007.

    Conklin, Wm. Arthur; “Passwords aren’t Broken:The Authentication System is”, Proceedings of

    the 6th Annual Security Conference, Las Vegas, April 2007.

    *Conklin, Art; Perry, David, “End user behavior and Internet security”, RSA2007, San Francisco,

    CA, February 2007

    *Conklin, Art; Dietrich, Glenn; “Secure Software Engineering: A New Paradigm”, Proceedings of

    the 40th Annual Hawaii International Conference on System Sciences, January 2007.

    *Conklin, Art; “Barriers to Adoption of e-Government”, Proceedings of the 40th Annual Hawaii

    International Conference on System Sciences, January 2007.

    *Conklin, W. A., “Bottom-Up meets Top-Down: A New Paradigm for Software Engineering

    Instruction”, Proceedings of the 10th Annual Colloquium for Information Systems Security

    Education, June 5-8, 2006, University of Maryland University College, Adelphi, Maryland, ISBN:

    1-933510-98-6, Pages 131-136

    *White, Greg; Conklin, Art; “e-Government and Cyber Security: The Role of Cyber Security

    Exercises”, Proceedings of the 39th Annual Hawaii International Conference on System

    Sciences, 4-7 January 2006, Pages 79-87.

    *Conklin, Art; “Cyber Defense Competitions and Information Security Education: An Active

    Learning Solution for a Capstone Course”, Proceedings of the 39th Annual Hawaii International

    Conference on System Sciences, 4-7 January 2006, Pages 220-225.

    Conklin, A.; “The Use of a Collegiate Cyber Defense Competition in Information Security

    Education”, 2005 INFORMATION SECURITY CURRICULUM DEVELOPMENT Conference

    (InfoSecCD 2005) September 23-24, 2005 Kennesaw State University, Georgia

    *Conklin, A., Dietrich, G.; “Modeling End User Behavior to Secure a PC in an Unmanaged

    Environment”, 2005 Americas Conference on Information Systems, 11-14 August 2005, Omaha,

    NE.

    *Conklin, A., Dietrich, G.; “Secure Software Design Principles: A Systems Approach”, 2005

    Americas Conference on Information Systems, 11-14 August 2005, Omaha, NE.

    *Conklin, A., White, G.; “Graduate Level Assessment Course: A Model for Safe Vulnerability

    Assessment”, Proceedings of the 9th Annual Colloquium for Information Systems Security

    Education, 6-9 June 2005, Georgia Institute of Technology, Atlanta, Georgia, ISBN: 1-933510-

    99-4, Pages 109-114.

    *Conklin, A., Dietrich, G., Walz, D., “Password-based authentication: a system perspective”;

    Proceedings of the 37th Annual Hawaii International Conference on System Sciences, 2004., 5-

    8 Jan. 2004 Pages:170 – 179 (nominated for best paper)

    Conklin CV, 1/6/2015

    7

    1. Work in Progress/Under Review

    Conklin, Wm. Arthur; Young, Diana K.; Dietrich, Glenn; Emphasizing Security Within Systems

    Development Processes, European Journal of Information Systems.

    1. Research Funding

    Conklin, Wm. Arthur (PI), UH sub on BAHEP Wagner-Peyser Grant, $85,000, Feb 2014

    Conklin, Wm. Arthur (PI), University of Houston Faculty Development Improvement Program

    grant, TEPM Writing Center Project, $24,932, May 2011.

    Conklin, Wm. Arthur (PI), University of Houston Research Grant, SCADA Laboratory Setup,

    $350,000, September 2010

    Cline, Ray (PI), Conklin, Wm. Arthur (SP), Department of Energy, Smart Grid Energy Training

    Coalition, response to DE-FOA-0000152, $2.5million over 3 years, July 2010.

    Conklin, Wm. Arthur (PI), Department of Energy, National Energy Sector Cyber Security Office

    Research (NESCOR), $237,000 over 3 years, August 2010.

    Conklin, Wm. Arthur, Heidar Malki (PI for CoT), Texas Workforce Commission, Meeting

    Industries’ Critical Workforce Needs Bay Area Houston Economic Partnership – Aerospace

    Project (build Information Assurance Curriculum) (w/ M. Gibson), $100,824 out of $252K CoT

    total award, (co-PI for IA curriculum dev piece), April 2007- March 2009

    1. Service

    Service to Department

     Program Coordinator for Information Systems Security Program 2011 – present

     Chair, Academic Search Committee, ISTE tenure track position, Fall 2007

     Member, Academic Search Committee, ISTE non-tenure track position, Spring 2007

    Service to College

     Director, Center for Information Security Research and Education (CISRE), 2010 –

    present

     Chair, Graduate Academic Council, Fall 2007 – 2011, Spring 2013 – present

     Member Deans Advisory Committee, 2012-2013, 2014-2015 Academic Years.

     Assisted in preparation of documents to create the Center for Information Security

    Research and Education (CISRE)

     Application for coursework certification for NSA recognition of ITEC6324 (CNSS 4016E)

     Application for NSA Center of Academic Excellence in Information Assurance Education

    Service to Profession/Academic Discipline

    Co-Chair, DoD/DHS Software Assurance Forum, Workforce Education and Training Working

    Group, 2009 – present (Member, 2006 – present)

    Conklin CV, 1/6/2015

    8

    Mini-Track Chair, Hawaii International Conference on System Sciences (HICSS),

    E-Government track, Information Security Minitrack, 2005 – present

    Chair, NSA/DHS committee on CAEIAE redesignation scoring, Summer/Fall 2011.

    Member, Education and Training Working Group, Department of Homeland Security Industrial

    Control Systems Joint Working Group, (DHS ICSJWG)

    Reviewer of Committee on National Security System Standards (CNSS) Information Assurance

    Standards update for the National Initiative in Cybersecurity Education (NICE)

    Academic Coordinator, BlackHat USA 2009, 2010 and DefCon 17, 18

    Academic Coordinator, Hacker Halted 2010

    Associate Editor, International Conference on Information Systems (ICIS) 2009

    Mini-Track Chair, Americas Conference on Information Systems (AMCIS), Software Assurance

    mini-track, 2011

    Co-Chair, Information security research and applications Track, SAC 2010

    Co-Chair, 12th Annual Colloquium for Information Systems Security Education (CISSE)

    Friend of the board for National Academy of Sciences, Transportation Research Board, ABE

    Critical Infrastructures. 2006-2007

    Participant, NSF workshop, Bridging the Cyber, Physical and Social Worlds, organized by

    Missouri University of Science and Technology, The Great Plains Network, Kansas City, MO,

    May 27-28, 2009

    Article Reviewer:

     European Conference on Information Systems ECIS 2014

     IFIP WG 11.10 International Conference on Critical Infrastructure Protection 2013

     Behaviour & Information Technology 2009, 2010, 2011

     Management Information Systems Quarterly (MISQ) 2008 special edition for security

     Journal Information System Security (JISSEC) 2008

     International Conference on Information Systems (ICIS) 2002, 2004, 2005, 2007, 2008

     Americas Conference on Information Systems(AMCIS) 2005, 2007, 2008, 2011

     Hawaii International Conference on System Sciences (HICSS) 2003-2011

     6th Annual Security Conference 2007

     8th Annual Security Conference 2009

     WISP pre-ICIS SIGSEC Workshop 2007

     IAIM pre-ICIS SIGED Workshop 2007

     Colloquium for Information Systems Security Education (CISSE) 2004 – 2011

     IEEE Computer 2005

     InfoSecCD 2005 Kennesaw State University

     Digital Forensics Research Workshop 2004, 2005

     

    Conklin CV, 1/6/2015

    9

    Invitational Events:

     Panel Member, Cybersecurity Education, Training, and Pipeline, Professionalizing the

    Nation’s Cybersecurity Workforce:Criteria for Future Decision-Making, The National

    Academies, Held in San Antonio, TX, March 27, 2013

     Panel Moderator, Seventh Annual IFIP WG 11.10 International Conference on Critical

    Infrastructure Protection, Washington, DC, March 18-20, 2013

     Panel Moderator, SANS North American SCADA Summit, Orlando, FL, February 2013

     Panel Moderator, Cyber Security Operations Centers, Acting not Reacting, Executive

    Symposium, Washington, DC, September 2011

     Invited Speaker, Anti-Phishing Working Group eCrime Researchers Summit, Fix the

    User: An Approach to System Security Education, October 2010

     Invited Speaker, DHS Industrial Control Systems Joint Working Group ICSJWG,

    Lessons Learned in IT: The Role of DHS Essential Body of Knowledge (EBK) and ICS,

    October 2010

     Invited Speaker, AFCEA, San Antonio, Compliance v. Security, February 2010

     Mini-Keynote, Role of Academia in Software Assurance, DOD/DHS Software Assurance

    Forum, November 2009

     Invited Attendee, 2004 Digital Forensics Research Workshop,

     NSF Workshop on “Exploring a National Cyber Security Exercise for Colleges and

    Universities”, February 27-28, 2004.

    DHS sponsored events

     Official Photographer 2014 National Collegiate Cyber Defense Competition

     Orange Team Leader 2013 National Collegiate Cyber Defense Competition

     Academic Coordinator National Collegiate Cyber Defense Competition

     White Team 2009 National Collegiate Cyber Defense Competition

     White Team 2008 National Collegiate Cyber Defense Competition

     White Team 2007 National Collegiate Cyber Defense Competition

     White Team Coordinator 2006 National Collegiate Cyber Defense Competition

     Red Team Leader, 2009 Texas Regional Collegiate Cyber Defense Competition

     White Team/ Team Facilitator 2008 Texas Regional Collegiate Cyber Defense

    Competition

     Chief Judge, 2007 Texas Regional Collegiate Cyber Defense Competition

     White Team Member 2006 Texas Regional Collegiate Cyber Defense Competition

     White Team Coordinator 2005 Texas Regional Collegiate Cyber Defense Competition

    Local Presentations

     Secure World Houston, (2012, April), SCADA Security: How Hard Can it Really be?,

    Conference speaker at industry based security conference.

     Secure World Houston, (2011, April), Trends in Information Security, Conference

    speaker at industry based security conference.

     Secure World Houston, (2010, February), Black Belt for Security, Conference speaker at

    industry based security conference.

     Secure World Houston, (2009, April), Systems Thinking and INFOSEC Decision Making,

    Conference speaker at industry based security conference.

    Conklin CV, 1/6/2015

    10

     ISSA San Antonio, (2008, December) presented seminar on Using the Internet for

    communication to mass populations during natural disasters.

     

     ISSA CISSP study group, (2008, July), presented seminar on Cyber Law and

    Regulation.

     Houston Production Manager’s Association (HPMA), (2008, April), Information Security

    and Small Business, presented to lunch meeting of professional organization

     Texas Regional Infrastructure Security Conference(TRISC), (2008, April) San Antonio,

    Conference speaker, Role of the Federal government in the securing of cyberspace.

     Secure World Houston, (2008, April), Systems Thinking and INFOSEC Decision Making,

    Conference speaker at industry based security conference.

     RSA Conference, (2008, April), San Francisco, CA, Birds of a Feather session, software

    assurance, chaired a table on secure code principles for industry members.

     ISSA Gulf Coast Chapter, (2007, January), Computer Security Behaviors of Home PC

    Users: A Diffusion of Innovation Approach, speaker for Professional Society meeting,

    NASA

     ISSA Houston, (2006, October), Computer Security Behaviors of Home PC Users: A

    Diffusion of Innovation Approach, speaker for Professional Society meeting

    1. Other

    Wass House, Inc.

     Software Development, custom medical software, University Hospital System,

    San Antonio, TX 1998 - 2005

     Software Development, Object Oriented Programming, Harcourt Education, San

    Antonio, TX, 2004-2005

     Software Development, Secure Coding, L-3 Corporation, Oklahoma City, OK,

    2008

     Program Development, Critical Infrastructure Education Program, Microsoft

    Corp., Seattle, WA, 2010

    Personal

    Fellow, ISSA, 2013

    Fellow, National Board of Information Security Examiners, 2011

    Chair, Academic Advisory Board, EC-Council, MSS University Offering, 2010

    Senior Advisor, National Software Assurance Repository (NSAR) project, DoD funded research

    project at the University of Detroit – Mercy, 2009-2010.

    Members AITP, AIS, ACM, IEEE, ISACA, DSI, ATMAE

    Senior Member ASQ

    Member Epsilon Pi Tau, the International Honor Society for Technology Professionals

    Conklin CV, 1/6/2015

    11

    Member Infragard, Houston Chapter

    Helped re-establish student AITP chapter at UH (sponsor Fall 2007-Spring 2008)

    Nominations/Election Chair, ISACA Houston Chapter 2008 Annual General Meeting

    ISACA Houston Chapter Academic Liaison 2007-2009

    Team member of the winning team Digital Forensics Challenge 2004

    IAM, IEM Certifications, National Security Agency

    SANS GICSP Global Industrial Cyber Security Professional

    CompTIA Security+, CASP certifications

    ISC2 CISSP, CSSLP certifications

    IEEE CSDP certification

    ISACA CRISC certification

    Licensed Private Investigator, State of Texas

    Digital Forensics Certified Practitioner Certificate #2010-212-152 Digital Forensics Certification

    Board

    Expert Witness, Digital Forensics and e-discovery, State of Texas

    Jeff Russo

    v.

    M-I L.L.C. d/b/a M-I SWACO

    v.

    National Oilwell Varco, L.P.,

    Cause No. 2014-18432, In the 189th District Court of Harris County, Texas.

    Corey Small and Terrance Hudson

    v.

    Robbins & Myers, Inc., Robbins & Myers Energy Systems, Inc., and Robbins & Myers Energy

    Systems L.P.

    United States District Court for the Southern District of Texas Houston Division,

    Civil Action No. 4:12-cv-00029

    Enbridge Energy Partners, L.P., et al.

    v.

    Stupp Corporation, et al

    District Court of Harris County, Texas 269 Judicial Court, Cause No. 2008-13773

    Guardianship of Lenny Charles Katz, an Incapacitated Person

    Jerold B. Katz, Guardian of Lenny C. Katz, et al

    v.

    Robert M. Gross, et al

    Probate Court Number One (1) of Harris County, Texas, Cause No. 224,239-401

    Richard Dale Johnston

    v.

    International Plant Services LLC

    American Arbitration Association, No. 70 166 00364 09

  • Contact information

    N233 Engineering Building 1
    Phone: 713-743-1556 | Fax: 713-743-4032